exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26,176 - 26,200 of 54,379 RSS Feed

Exploit Files

InduSoft Web Studio Arbitrary Upload Remote Code Execution
Posted Oct 4, 2012
Authored by Luigi Auriemma, juan vazquez | Site metasploit.com

This Metasploit module exploits a lack of authentication and authorization on the InduSoft Web Studio Remote Agent, that allows a remote attacker to write arbitrary files to the filesystem, by abusing the functions provided by the software. The module uses uses the Windows Management Instrumentation service to execute an arbitrary payload on vulnerable installations of InduSoft Web Studio on Windows pre Vista. It has been successfully tested on InduSoft Web Studio 6.1 SP6 over Windows XP SP3 and Windows 2003 SP2.

tags | exploit, remote, web, arbitrary
systems | windows
advisories | CVE-2011-4051, OSVDB-77179
SHA-256 | 3fdafb054398a32fb8b23fd92f9caabbc9e00bce705897aaeb32c9f0b57d9a2a
WordPress Remote Command Execution
Posted Oct 4, 2012
Authored by Nafsh

WordPress may suffer from a remote command execution vulnerability.

tags | exploit, remote
SHA-256 | 3ddeffcccbff53b5e13af69c322ebfd90f4169d91e4e3de98ef09a1c11e26077
Oracle Identity Management 10g Cross Site Scripting
Posted Oct 4, 2012
Authored by LiquidWorm | Site zeroscience.mk

Oracle Identity Management suffers from a reflected cross site scripting POST injection vulnerability when parsing user input to the 'username' parameter via POST method thru '/usermanagement/forgotpassword/index.jsp' script. Attackers can exploit this weakness to execute arbitrary HTML and script code in a user's browser session. Version 10.1.4.0.1 is affected.

tags | exploit, arbitrary, xss
SHA-256 | 11ad165297c46531c1bd989c2c880dd5e46fce591848aa84984ee7c5353bca88
MyBB Remote Command Execution
Posted Oct 4, 2012
Authored by Nafsh

MyBB suffers from a remote command execution vulnerability.

tags | exploit, remote
SHA-256 | 30b47d3b1bae681546804f1a1f08db38d3c46dc40f935b8f9e6a3cda240cf948
XnView JLS File Decompression Heap Overflow
Posted Oct 3, 2012
Authored by Joseph Sheridan | Site reactionpenetrationtesting.co.uk

XnView versions 1.99 and 1.99.1 suffers from a heap-based buffer overflow vulnerability. Proof of concept JLS file included.

tags | exploit, overflow, proof of concept
systems | linux
advisories | CVE-2012-4988
SHA-256 | 12f75e008d1e820f5810b663abe9e6f03819746e68bc912e53351dc21ea9a32f
Template CMS 2.1.1 Cross Site Request Forgery / Cross Site Scripting
Posted Oct 3, 2012
Authored by High-Tech Bridge SA | Site htbridge.com

Template CMS version 2.1.1 suffers from cross site request forgery and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
advisories | CVE-2012-4901, CVE-2012-4902
SHA-256 | f8abf37639cf0553f4391d208e25723d53d985a4a7b9cc5ee591c7708a514809
phpMyBitTorrent 2.04 SQL Injection / Local File Inclusion
Posted Oct 3, 2012
Authored by Janek Vind aka waraxe | Site waraxe.us

phpMyBitTorrent version 2.04 suffers from insecure cache handling, remote file disclosure, local file inclusion, and remote SQL injection vulnerabilities.

tags | exploit, remote, local, vulnerability, sql injection, file inclusion
SHA-256 | 25fb87d1faed33e02e6892952db60e041cb9171205e8aec0e9f52fbac8d97fb7
PHPTax 0.8 Remote Code Execution
Posted Oct 3, 2012
Authored by infodox, Jean Pereira

PHPTax versions 0.8 and below remote code execution exploit. Written in Python.

tags | exploit, remote, code execution, python
SHA-256 | 86294030fd719aa799ec672577b9d00f4cb5ff09a5e758f0b04271418448dd6a
Novell Sentinel Log Manager 1.2.0.2 Bypass
Posted Oct 3, 2012
Authored by Piotr Chmylkowski

Novell Sentinel Log Manager versions 1.2.0.2 and below allow unauthenticated users the ability to configure data retention policies.

tags | exploit, bypass
SHA-256 | f9550b9bb56838e4a763fd7aac655f16ba5fc20d46d5612b4d11feb17b24ba9d
NCMedia Sound Editor Pro 7.5.1 Buffer Overflow
Posted Oct 3, 2012
Authored by b33f

NCMedia Sound Editor Pro version 7.5.1 buffer overflow exploit with SEH and DEP.

tags | exploit, overflow
SHA-256 | 4195ae37fdb252cffc6ea369a4e3f28b378fc74c86697f3ab2e437a9b9fbd9c1
Omnistar Mailer 7.2 SQL Injection / Cross Site Scripting
Posted Oct 3, 2012
Authored by Ibrahim El-Sayed, Vulnerability Laboratory | Site vulnerability-lab.com

Omnistar Mailer version 7.2 suffers from remote SQL injection and cross site scripting vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 4acd4c095dc0486626e4864ec1e8379733c7558ab90f31e3149a86a143a9be4f
WordPress Spider 1.0.1 SQL Injection / XSS
Posted Oct 3, 2012
Authored by Daniel Barragan

WordPress Spider plugin version 1.0.1 suffers from cross site scripting, HTTP parameter pollution, and remote SQL injection vulnerabilities.

tags | exploit, remote, web, vulnerability, xss, sql injection
SHA-256 | 7a9a670b6a5688030b9e4d703e1b8649dda210e799378af153a651c0cc7ef47e
23rdweb Studio SQL Injection
Posted Oct 3, 2012
Authored by Net.W0lf, Hack Center Security Team

23rdweb Studio suffers from a remote SQL injection vulnerability. Note that this finding houses site-specific data.

tags | exploit, remote, sql injection
SHA-256 | faa8ba15053d2a2fe7520b5a0f4fdb4ebc54b98f48ecbf3a5c48f7dc56fb72b3
MS11-080 AfdJoinLeaf Privilege Escalation
Posted Oct 3, 2012
Authored by Matteo Memelli, Spencer McIntyre | Site metasploit.com

This Metasploit module exploits a flaw in the AfdJoinLeaf function of the afd.sys driver to overwrite data in kernel space. An address within the HalDispatchTable is overwritten and when triggered with a call to NtQueryIntervalProfile will execute shellcode. This Metasploit module will elevate itself to SYSTEM, then inject the payload into another SYSTEM process before restoring it's own token to avoid causing system instability.

tags | exploit, kernel, shellcode
advisories | CVE-2011-2005
SHA-256 | f6dc1203a74e12170988c31fabd455ab39d26e8231aa917f56967362c0509242
phpFreeChat 1.4 Cross Site Scripting
Posted Oct 2, 2012
Authored by Mesut Timur | Site netsparker.com

phpFreeChat version 1.4 suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 1b82a33a3e1e68375da09a67b32f8842cbefe9c87c225ad7a5b1c2ad22258452
PayPal Cross Site Scripting
Posted Oct 2, 2012
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

It appears that multiple cross site scripting vulnerabilities were discovered in PayPal.com.

tags | exploit, vulnerability, xss
SHA-256 | f5239e9a4f5906c6ed51aa1c2f017f03fb91b576f0133a33b8ab8219f2ba8a70
ProjectPier 0.8.8 Shell Upload
Posted Oct 2, 2012
Authored by BlackHawk

ProjectPier versions 0.8.8 and below suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | d1e036a79a1b141620ded93726111ef41fa82aa390f1904f6586e24f31fa9180
TP-LINK TD-W8151N Cross Site Request Forgery
Posted Oct 2, 2012
Authored by Akastep

TP-LINK TD-W8151N 150Mbps wireless N ADSL+2 modem router suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | 427ec14298c7ccdd86476a0829cf8b76602d498105b951c45aba638947ed5cb6
Zenphoto 1.4.3.2 Cross Site Scripting
Posted Oct 2, 2012
Authored by Scott Herbert

Zenphoto version 1.4.3.2 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | c313654cf06a5459638e4cb26e414198c80c70942da3bd786c488538808104e7
PhpTax 0.8 Remote Code Execution
Posted Oct 2, 2012
Authored by Jean Pereira

PhpTax version 0.8 suffers from a remote code execution vulnerability.

tags | exploit, remote, code execution
SHA-256 | d0d6e0e1685582da24a6399ab9398b69b943a0fb2d14f8839ddf5d959307e3d4
Handshakes Professional 4.1 SQL Injection
Posted Oct 2, 2012
Authored by HTTPCS

Handshakes Professional version 4.1 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 35b955a7d870227ad43152ccc8657154fedddb89d144cf08d642e76d7ee49ada
Dart Communications Stack Overflow
Posted Oct 2, 2012
Authored by catatonicprime

DartWebserver.Dll, an HTTP server by Dart Communications, suffers from a stack overflow vulnerability. Versions 1.9 and below are affected. Proof of concept code included.

tags | exploit, web, overflow, proof of concept
advisories | CVE-2012-3819
SHA-256 | 305223063ea1f05d0ded3e552a5555e23607589feed9ca8044b36a03554ae90f
Soapbox 0.3.1 Local Root
Posted Oct 2, 2012
Authored by Jean Pereira

Soapbox version 0.3.1 suffer from a local root code execution vulnerability.

tags | exploit, local, root, code execution
SHA-256 | fa6111f3bfe8c24bb8bf372dad0c191f2ae37919333b768bc405657c4799c826
IBM Lotus Notes Traveler 8.5.3 XSS / CSRF / Brute Force
Posted Oct 2, 2012
Authored by MustLive

IBM Lotus Notes Traveler versions 8.5.3 and below suffer from cross site request forgery, cross site scripting, brute force, and redirection vulnerabilities.

tags | exploit, vulnerability, xss, csrf
SHA-256 | 95514a5e1a4429bebd982e1837c3801ea2f7ce55bc98c72e1145cda686b8a99e
Whereincity Cross Site Scripting
Posted Oct 2, 2012
Authored by Am!r | Site irist.ir

Sites designed by Whereincity.com suffer from a cross site scripting vulnerability. Note that these findings house site-specific data.

tags | exploit, xss
SHA-256 | b7661ae029838ae5eb7093c71b0d7e534f4fb21e65fbb39f179385cc36701e22
Page 1,048 of 2,176
Back1,0461,0471,0481,0491,050Next

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    0 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    0 Files
  • 8
    Oct 8th
    0 Files
  • 9
    Oct 9th
    0 Files
  • 10
    Oct 10th
    0 Files
  • 11
    Oct 11th
    0 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close